Dear Sir
i am infosec Engineer and we detected an exploit in your Access_JDBC30.jar file in one of our clients , actually different antivirus product detected (JET4) as crafted .MDB file which attempts to exploit a vulnerability in Microsoft Jet Database Engine (Jet) that could allow remote code execution.
More information about the said vulnerability can be found in the following link:
Microsoft Security Advisory (950627)
Once successfully exploited, the said vulnerability could allow this Trojan to drop and execute an .EXE file detected by Trend Micro as TROJ_AGENT.AABE. As a result, routines of the dropped file may be exhibited on the affected machine.
check the following site:
http://www.virustotal.com/analisis/23f36bc240d6bfc33b6e1b447aecdd51
and detected by Symantec as Bloodhound.Exploit.183
http://www.symantec.com/security_response/writeup.jsp?docid=2008-032619-5301-99&tabid=2
i already searched your support forum and found others ask about it as in:
http://www.hxtt.com/support_view_issue.jsp?product=access&id=1204642869
but the answers were not enough we need more clarifications please !!!
|
It's still a wrong virus report. After we reported Avast that issue, it seems Avast doesn't report wrongly again.
Please check http://www.virustotal.com/analisis/617eb1c7b3ebb0c281bcead74eef95e1, you will see only
eSafe 7.0.15.0 2008.06.05 Suspicious Archive Structure
If you see
http://www.virustotal.com/analisis/d7b1b9bf936983e63b080589f54b4ac7
you will find that wrong report happened only when that same JET4 file is in a zip file, and disappear when it is scanned as a single file.
|